JBTech Retailhttps://www.jbtech.com
Sat, 25 May 2019 11:57:11 +0000 en-US
hourly
1 https://wordpress.org/?v=5.1.1https://pronto-core-cdn.prontomarketing.com/2/wp-content/uploads/sites/2316/cache/2019/05/cropped-favicon/3327681272.jpgJBTech Retailhttps://www.jbtech.com
3232How to make your Android apps more organizedhttps://www.jbtech.com/2019/05/how-to-make-your-android-apps-more-organized/
Fri, 24 May 2019 20:00:48 +0000http://jbtech.bypronto.com/?p=1792Finding it hard to find the app you want on your Android device? If so, it’s time to organize your apps into folders. Here’s how. Creating and naming folders On most devices, when you install a new app, the icon will be automatically added to your home screen, or to a screen where there is […]]]>

Finding it hard to find the app you want on your Android device? If so, it’s time to organize your apps into folders. Here’s how.

Creating and naming folders

On most devices, when you install a new app, the icon will be automatically added to your home screen, or to a screen where there is space. While this is useful, it can be a bit of a chore to find a specific app if you have dozens installed on your device.

The easiest solution is to group icons together into a folder. This just takes three steps:

Long-press an app you want to move into a folder (i.e., tap the app for a few seconds until you enter edit mode).

Drag it over another app you want to group it with, and let go. You should see both of the icons appear inside a box.

Tap Enter folder name and type the label for your folder.

If you are going to use different folders, it is a good idea to pick names related to the apps they contain. For example, if you put all of your email apps in one folder, call the folder “Email.” This will make your apps easier to find.

Adding/Removing apps from folders

At the bottom of the box, you’ll see the “Add Apps” option. Press it, then tick the app or apps you want to include in your folder. Once you’ve made your pick, tap Add at the top-right corner of your screen.

You can also add apps to your folder when you’re on your home screen. For every app you want to move, just long-press it, then drag and drop it into the folder of your choice.

Lastly, to remove apps from folders, open the folder where the app is, long-press the app you want to take out, then press the “Remove from home” option.

Moving folders

You can move a folder’s location the same way you do so with an app: Tap and hold on the folder until the screen changes slightly and drag it to where you would like it to be. On newer versions of Android, the apps should all move to make room for the folder.

Deleting folders

Finally, you can delete a folder by either dragging all of the apps out of the folder, or pressing and holding on the folder until the screen changes and dragging it up to Remove. This will remove the folder and all the stored app icons, but it won’t delete the apps.

If you have any questions about using an Android device, contact us today to see how we can help.

]]>Get on top of search results with Google Postshttps://www.jbtech.com/2019/05/get-on-top-of-search-results-with-google-posts/
Wed, 22 May 2019 20:00:25 +0000http://jbtech.bypronto.com/?p=1787Many businesses struggle to get their name into the top ten search results in order to greatly increase traffic to their website or have a better image to potential clients. Those who are successful invest a lot of time and money in SEO and other inbound marketing to gain this prestige and online presence for […]]]>

Many businesses struggle to get their name into the top ten search results in order to greatly increase traffic to their website or have a better image to potential clients. Those who are successful invest a lot of time and money in SEO and other inbound marketing to gain this prestige and online presence for their brand. What if there was a free and simple way to improve your search rankings? There is, and it’s called Google Posts.

What they can do

Google Posts allow users to communicate directly in the search results. This differs from the Knowledge Panel since you can highlight content, information, products, or services. Google Post can appear on the search results, Knowledge Panel, or both.
Google simply describes it as “up-to-date posts from verified people, places, or things, directly in search results.” These posts can be text, images, videos, events, or even animated GIFs. You can even add links on the posts to drive traffic to a particular page, service, or product. This enhanced format enables searchers to get information directly from you while complementing existing search results across the web.

Postings

Your posting instantly shows up in search results on both mobile and desktop platforms. You can then schedule the time and duration of the post with ease. This is a great feature that provides immediate access and can be particularly useful when you are planning to launch a product, open a pop-up store, or run a promotion. Also, Google Analytics will give you updates on how many people have seen and interacted with your content.

Move over Google+

Google is finalizing the transition of businesses from Google+ to Google Posts. Once part of businesses’ social media strategy, big changes came to Google+. April 2, 2019 marked the official shut down of the consumer version of Google+. Small business will still be able to use Google+ to interact with customers, but only those who are G Suite Android users. Those same businesses can now use Google Posts as an easier way to communicate directly with prospects and customers in Google’s search results.

Availability

Google Posts is available to everyone with a Google My Business account. Log in or create a profile for your business. Once you’re in your account, Posts will be an option on the left hand navigation. It doesn’t take a lot of time to create a Post, so you can make it part of your social media promotional strategy. But you will have to create one in real time, since Google doesn’t allow third party tools like Hootsuite to post for you.

Will Google Posts increase your SEO? Only time will tell if it will be as impactful as we hoped. As with Google + and Google Authorship, Google likes to test out new features, which sadly don’t always catch on. However, Google is always hungry for fresh content. As the number one driver of traffic for business, Google Posts makes sense.

]]>Keep your Mac clutter-free with these 10 tipshttps://www.jbtech.com/2019/05/keep-your-mac-clutter-free-with-these-10-tips/
Tue, 21 May 2019 20:00:42 +0000http://jbtech.bypronto.com/?p=1783Even the most high-tech and innovative computers can slow down when you store too many files on them. If you want to ensure that your Mac performs at its best at all times, you should turn decluttering into a habit. #1 Clean up your desktop The desktop is a convenient location for storing files and […]]]>

Even the most high-tech and innovative computers can slow down when you store too many files on them. If you want to ensure that your Mac performs at its best at all times, you should turn decluttering into a habit.

#1 Clean up your desktop

The desktop is a convenient location for storing files and shortcuts, so it tends to become messy within a short amount of time. To declutter, identify which programs you rarely use and remove their icons from the desktop. As for your files, keep a weeks’ worth of items in a single folder, which you will name using the current date. Create another folder for the following week’s files and store your weekly folders in yet another folder. This keeps all your files within a single location on your desktop.

Or you could use the Stacks introduced with the Mojave operating system. This feature organizes the items on your desktop into neat stacks classified according to file type.

#2 Organize your files

Files outside of your desktop that are not too important or you do not use often may be stored in external hard drives. Also, folders are ignored too often, so do not create a lot of them. If sub-folders are unnecessary, do not use them.

#3 Reduce downloads and trash

Your trash and download storage are probably two of the most convoluted locations on your Mac. Remove unnecessary files or, when possible, empty them altogether. This will not only tidy up your computer, but it will also give you back storage space for more important items.

#4 Recover storage space

In the Apple menu, go to About This Mac and click Storage. You will see how much free space you have and how much is occupied by different file categories. Clicking on Manage will show you ways to optimize your computer’s storage.

#5 Delete old bookmarks

Bookmarks are handy but most of them are just clutter. Identify the ones you do use regularly and delete the ones you don’t. In Safari, go to the Bookmarks menu and choose Edit Bookmarks. Right-click on the items you don’t need and remove them. You can also organize your bookmarks by placing them in folders.

#6 Sort your emails

Make it a habit to rid your inbox of unimportant emails. If you find ones you can answer within five minutes, do so. Those that would take much longer to respond to, you can transfer to a folder named “Work in Progress” or something similar and work on them when you have the time. Archive important emails using a separate folder. To reduce the number of emails you receive, unsubscribe to newsletters you don’t need.

#7 Clear your RSS feed

Updates from blogs and websites you follow take up space. Identify and sort out RSS feeds you don’t need.

#8 Delete unused contacts

You never know when you’ll need to reach out to someone in your network, so it’s great to have their contact details in your Mac. But if you have contacts whose face you don’t even remember anymore, it’s probably time to take them off your list and free up some space in the process.

#9 Erase bad photos

Photos are a great way to preserve memories, but they are taxing on your computer’s memory, too. Delete photos that are blurred or fuzzy, or those that you cannot use or do not consider valuable. You can also do the same to videos.

#10 Uninstall unnecessary software

If your computer has software you don’t use or is redundant, it’s best to just uninstall them. Besides freeing up space, doing so may also improve your computer’s performance.

Get the most out of your Mac with advice from our IT experts. Call us today!

]]>The perfect Office 365 plan for your businesshttps://www.jbtech.com/2019/05/the-perfect-office-365-plan-for-your-business/
Thu, 16 May 2019 20:00:46 +0000http://jbtech.bypronto.com/?p=1778With its state-of-the-art tools and features, Office 365 helps businesses manage data, share files, and improve team collaboration. You might be thinking of using this tool to improve your operations, but with the different Office 365 plans available on the market, how can you make sure that you’ll get your money’s worth? This article will […]]]>

With its state-of-the-art tools and features, Office 365 helps businesses manage data, share files, and improve team collaboration. You might be thinking of using this tool to improve your operations, but with the different Office 365 plans available on the market, how can you make sure that you’ll get your money’s worth? This article will help you choose the right plan for your business.

Business or Enterprise

Office 365 Business and Enterprise are the obvious choices if you’re running cloud-based business systems. Both of these plans will give you access to the data management app Office Online and file hosting service OneDrive, but there are some notable differences between the two.

In terms of SharePoint, a collaborative platform and document and storage system, Business plans are short on enterprise search, Excel services, and Visio — a diagramming and vector graphics app — features. They also lack in unified communication solutions, such as Power BI, an interactive data visualization tool, and Delve Analytics, which provides real-time work analytics to businesses.

With these points in mind, it may seem like Enterprise subscriptions are superior — and in some ways, they are — but Business plans are more suited for smaller companies running on a tight budget. Office 365 Business and Business Premium cost $10 and $15 per user per month, respectively, while the highest-end Enterprise plan costs $35 per user per month.

As a general rule, only consider subscribing to the Enterprise plans when your employee headcount exceeds 50 people and users require more storage space solutions. Otherwise, business plans are the perfect choice for you.

E1, E3. or E5?

Once you’ve decided to go for the Office 365 Enterprise plans, you need to choose which plan (E1, E2, or E5) suits your business requirements.

E1 offers basic solutions, such as Outlook, Word, OneNote, PowerPoint, and Excel for only $8 per month. It also provides access to SharePoint Team sites, video conferencing, and Yammer for social media for businesses.

E3, on the other hand, provides all E1 features together with data loss prevention, rights management, and encryption to ensure your business’s security and compliance.

Lastly, E5 is a full enterprise-grade solution with all the aforementioned features plus analytics tools, advanced threat protection, flexible Skype for Business conferencing, and unified communications solutions.

Small- and medium-sized businesses often select either E1 or E3 and subscribe to third-party applications for their cloud security and VoIP needs. But if you have the resources and prefer a single provider to manage your suite, the E5 plan is the way to go.

Migrating to Office 365 is not an easy task, and if you’re still undecided about which plan to opt for, contact us today. We won’t just provide Office 365; we’ll also assess your business to find the best plan that fits your budget and business goals.

]]>Browser extensions and online securityhttps://www.jbtech.com/2019/05/browser-extensions-and-online-security/
Tue, 14 May 2019 20:00:08 +0000http://jbtech.bypronto.com/?p=1761Think you’ve got enough online security measures in place within your company? It’s hard to tell since you’ll never really know what the next malware or online scam will bring. Plus, it only takes one employee’s mistake to put the company in danger. It’s time to add another layer of online security using browser extensions. […]]]>

Think you’ve got enough online security measures in place within your company? It’s hard to tell since you’ll never really know what the next malware or online scam will bring. Plus, it only takes one employee’s mistake to put the company in danger. It’s time to add another layer of online security using browser extensions.

Prevent browser tracking

If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery.

Blocking ads

While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.

Consider installing a VPN

A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.

If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.

]]>4 ways to boost staff efficiencyhttps://www.jbtech.com/2019/05/4-ways-to-boost-staff-efficiency/
Mon, 13 May 2019 20:00:46 +0000http://jbtech.bypronto.com/?p=1757Technology enables businesses to work remotely, collaborate more efficiently, and manage their time more effectively. But to achieve these benefits, you need to implement technologies that align with your business’s needs. Here are some things to consider. Change office communication To increase efficiency, set up instant messaging software such as Slack or Microsoft Teams. This […]]]>

Technology enables businesses to work remotely, collaborate more efficiently, and manage their time more effectively. But to achieve these benefits, you need to implement technologies that align with your business’s needs. Here are some things to consider.

Change office communication

To increase efficiency, set up instant messaging software such as Slack or Microsoft Teams. This allows employees to communicate anytime, anywhere instead of having to get up from their desks to see whether the person is available.

Of course, if you need to discuss big projects or issues, face-to-face communication is likely the best choice. But you can simply send a quick message for more trivial conversations, saving precious minutes and allowing you to get more work done.

Install video conferencing

Traveling to offsite meetings and training sessions takes time. Rather than commuting for hours outside your office, opt for a networked phone solution that offers video calls and conferencing. This way, you can hold a video conference to discuss business matters from the comfort and convenience of your office. You can also take things up a notch and equip the conference room with tools to pull up documents and have them displayed on a big screen so that everyone in the meeting can follow the conversation with ease.

Upgrade workstations

Outdated technologies and workstations limit your business’s progress and are a hindrance to developing clued-up, efficient employees. Aging systems and slow networks can frustrate your team and bring productivity to a standstill. That’s why it’s important to take the time to assess your current workstations, applications, hardware, and tools. This doesn’t mean that you have to buy a set of entirely new workstations. But you should replace obsolete equipment with more up-to-date machines. In addition, make sure all software and applications are up-to-date to ensure maximum efficiency and employee satisfaction.

Implement ERP software

Enterprise Resource Planning (ERP) is a business process management software that allows organizations to automate processes and centralize data in order for employees to collaborate more efficiently. ERP software provides employees with up-to-date business information that they can easily access and use. What’s more, ERP also eliminates redundant data entry and reduces the number of spreadsheets that are used to record critical business data, by storing information in a centralized database.

To get the maximum return on your technology investment, it’s also important to partner with a knowledgeable and reliable service provider. Get in touch with our tech experts today to find out how we can implement technology to help your employees become more efficient and productive.

]]>New keyboard shortcuts for Windows 10 usershttps://www.jbtech.com/2019/05/new-keyboard-shortcuts-for-windows-10-users/
Fri, 10 May 2019 20:00:18 +0000http://jbtech.bypronto.com/?p=1754Since its release back in 2015, Windows 10 continues to receive updates and new features. This time, users are greeted with some new keyboard shortcuts that will make life easier. Here are our top picks that can be extremely helpful to your daily operations. Windows Snapping If you’ve never used Windows Snapping, you’re missing out […]]]>

Since its release back in 2015, Windows 10 continues to receive updates and new features. This time, users are greeted with some new keyboard shortcuts that will make life easier. Here are our top picks that can be extremely helpful to your daily operations.

Windows Snapping

If you’ve never used Windows Snapping, you’re missing out on one of Windows 10’s key features. Known as Aero Snap on Windows 7, the snapping feature allows you to snap windows vertically on top of each other. You can even snap windows to a 2×2 grid for better multitasking. Simply use these keyboard shortcuts:

Windows Key + Left – Snap current window to the left side of the screen

Windows Key + Right – Snap current window to the right side of the screen

Windows Key + Up – Snap current window to the top of the screen

Windows Key + Down – Snap current window to the bottom of the screen

You can also combine these shortcuts to snap your current window into a corner like top left, top right, and more.

Task Views

This window management feature allows you to see all your opened windows so you can quickly return to a specific program or document. This is particularly useful if you have multiple windows open at once. In addition to clicking the Task View button on the taskbar to open it, these keyboard shortcuts will do the trick:

Windows Key + Tab – Open a new Task View interface with windows from your current virtual desktop appearing in the Task View list. To switch between virtual desktops, simply use the virtual desktop switcher at the bottom of the screen.

Alt + Tab – While not a new keyboard shortcut per se, it allows you to switch between open windows on all virtual desktops.

Ctrl + Alt + Tab – This is similar to Alt + Tab but the thumbnails stay on the screen even after you release all the keys.

Virtual Desktop

A great way to stay organized, this nifty feature lets you use an unlimited number of virtual desktops so you can dedicate each of them for certain functions. For instance, one could be used solely for work with all your business software and the other for entertainment. Some keyboard shortcuts to help you quickly manage your virtual desktops include:

Windows Key + Ctrl + D – Create a new virtual desktop and switch to it

Windows Key + Ctrl + F4 – Close current virtual desktop

Windows Key + Ctrl + Left/Right – Switch to the virtual desktop on the left or right

If you’re looking for ways to boost productivity, or have any questions about how Microsoft Windows can help streamline your operations, just give us a call. Our IT experts are more than happy to help.

]]>What are 2-step and 2-factor authentication?https://www.jbtech.com/2019/05/what-are-2-step-and-2-factor-authentication/
Thu, 09 May 2019 20:00:44 +0000http://jbtech.bypronto.com/?p=1751In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available. Read on to know the differences […]]]>

In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available. Read on to know the differences between two-step authentication and two-factor authentication.

If you want to improve your business's cybersecurity for you and your customers, you should look at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cybersecurity. Many businesses use the terms two-step and two-factor authentication interchangeably. There are, however, subtle differences between the two.

Two-step authentication

A two-step authentication process requires a single-factor login (such as a password or biometric reading) as well as another similar type of login that is essentially sent to the user. For example, you may have a password for your first step and then receive a one-time-use code on your cell phone as the second step.

Two-step authentication adds an extra step in the verification process, making it more secure than single-step authentication (i.e., just the password). However, if a person or business is hacked, it won't be enough to stop hackers from getting a hold of whatever they are looking for.

Two-factor authentication

On the other hand, there is two-factor authentication (sometimes referred to as multifactor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate a user’s identity. For example, it could be a combination of a fingerprint or retinal scan as well as a password or passcode. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication.

The difference between the two

In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, make sure that you are using the right type of authentication in your business to keep your company and customer information as secure as possible.

Your network needs the best security technology has to offer. The type of authentication you should use is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call us today for all the help you could ever ask for.

]]>Hijackers might be using your PC to mine for BTChttps://www.jbtech.com/2019/05/hijackers-might-be-using-your-pc-to-mine-for-btc/
Tue, 07 May 2019 20:00:28 +0000http://jbtech.bypronto.com/?p=1748Because of the increasing value of cryptocurrency, it comes as no surprise that hackers have geared up to get more of it. They use a process called cryptojacking, which can considerably slow your PC down. If you notice your computer is performing in a subpar manner, hackers may already be using your hardware to make […]]]>

Because of the increasing value of cryptocurrency, it comes as no surprise that hackers have geared up to get more of it. They use a process called cryptojacking, which can considerably slow your PC down. If you notice your computer is performing in a subpar manner, hackers may already be using your hardware to make easy money.

Surge in cryptojacking

The biggest reason why cryptojacking is becoming so popular is that it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing. And even if it’s detected, it’s almost impossible to track down who initiated the attack. Moreover, since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.

Cryptojacking is also a cheap investment. For as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them. And while it’s difficult to tell how much exactly are hackers earning by cryptojacking, we can only surmise that it’s more than the initial $30.

Because of these reasons, there’s a good chance that this type of attack will be as popular as ransomware was in 2017. According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.

Prevention and response

Prevention is always better than cure, so include cryptojacking in your monthly security training sessions. If employees practice extra caution in dealing with unsolicited emails and suspicious links, then hackers will have no way into your systems. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.

Beyond prevention, network monitoring solutions should also be used to detect any unusual computer behavior. For example, if you notice a significant number of PCs running slower than usual, assume that cryptojacking is taking place. And once it’s confirmed, advise your staff to close browser tabs and update browser extensions as soon as possible.

Because cryptojacking doesn’t steal data, it may seem less threatening than some malware, but in reality, its effects are just as severe — it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure your business stays in top form (and that you don’t end up enriching any hackers), contact us today. Our hardware solutions and cybersecurity tips will keep your business safe and sound.

]]>5 Ways Office 365 migrations failhttps://www.jbtech.com/2019/05/5-ways-office-365-migrations-fail/
Fri, 03 May 2019 20:00:53 +0000http://jbtech.bypronto.com/?p=1745Microsoft is always ensuring that their popular cloud-based productivity suite, Office 365, is constantly being improved. Because of the great applications and support offered, small- to medium-sized businesses (SMBs) are continually migrating to the platform. If you are considering moving to Office 365, you should be aware of five factors that can cause a migration […]]]>

Microsoft is always ensuring that their popular cloud-based productivity suite, Office 365, is constantly being improved. Because of the great applications and support offered, small- to medium-sized businesses (SMBs) are continually migrating to the platform. If you are considering moving to Office 365, you should be aware of five factors that can cause a migration to fail so you can avoid them.

1. Slow internet connection speeds

To avoid this, ask an Office 365 provider to test your existing network connections to ensure that your internet connection can handle the migration and day-to-day operation of Office 365. If not, they should be able to offer you a more efficient solution.

Because Office 365 is primarily cloud-based, you are going to need a connection with a solid bandwidth. When migrating your files and system over to Office 365, you will likely need to consume a large quantity of bandwidth. This demand will often be enough to tax most small business lines, resulting in slower internet speeds all around during the process. Employees might struggle to do their jobs properly if they’re reliant on the internet, so it is recommended to do migrations during off hours.

Beyond this, Office 365 is most often delivered over an internet connection, rather than in-house servers. This means that the day-to-day demand for bandwidth will increase. If you are already noticing slow speeds and service interruptions before implementing Office 365, you will likely see these issues compounded after implementation.

2. Mailboxes and files are too big

While the business versions of Office 365 come with 100 GB of email storage and over 1 TB of file storage per user, getting your emails and files online could take a while, especially if you have users whose inboxes are approaching the storage limit.

As a general rule of thumb, larger files will cause the migration of files to take longer. If you don’t prepare for this, then you could see migration affecting work or even causing recurring issues of unavailable data when it’s needed.

To avoid this, encourage your staff to archive their email inboxes and either delete or remove emails with large attachments that aren’t necessary.

3. Uninformed users

The average Office 365 migration takes around one to three days, depending on the size of the business and the amount of data being carried over. If you start migration without informing users that some files and emails won’t be accessible during this period, or that some systems may not be working, you could end up with employees unable to do their jobs and creating resentment for the new platform.

Instead, inform your employees about how the migration will run and what they can expect during the process. Beyond this, you should run training sessions on how to use the new systems to ensure that everyone is briefed before they start to use them. This will increase the overall chance that the platform migration and subsequent use will be successful.

Older, less compatible software installed on systems

While many versions of Office 365 do come with subscriptions to the latest version of Microsoft Office, there’s built-in support for systems that are running slightly older versions of Office. If your business is using a version older than Office 2010 (e.g., Office 2003), you won’t be able to properly use Office 365.

Beyond this, you’ll also need to use the latest version of your internet browser. If you use Chrome or Firefox, this won’t be a problem. However, if you use Internet Explorer, you may run into issues, as Microsoft has already discontinued the program in favor of Microsoft Edge.

The good news about Office 365 is that actual systems requirements are low, so almost every business will be able to integrate it. We recommend that in order to be able to use all of Office 365's features, ask your provider to ensure that your software and systems are compatible with it.

5. DIY migrations

On paper, migrating to Office 365 is a fairly simple and straightforward process. What many companies find when they do the migration themselves is that the process is much more difficult than expected. They come across unexpected issues that require an IT expert to solve.

In order to ensure a smooth migration, it’s a good idea to work with an IT provider like us. We can ensure that your systems are ready and the migration is smooth. Contact us today to learn more.